The purpose of this project is to provide you with an

Assignment Help Computer Networking
Reference no: EM13346371

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute. The following aspects of litigation and document retention are covered:

- Applicability of availability, integrity, and confidentiality (AIC) concepts

- Confidentiality of personal information and contracts

- Applicability of American Legal System in the litigation process involving corporate, public, and private institutions

- IP issues

- Risk analysis and incident response procedures

- Forensic examination

Project Scenario:

You are the Chief Information Officer for Premier College. Recently,your college has received a notice from the Department of Education about an investigation of your college based on the state-specific testing and compliance procedures. The Department of Educationhas sent a Litigation Hold Notice wherein they have asked all college staff and administrators of the college to preserve all relevant documents, records, data, contracts (regardless of its location or medium), and correspondence notes.

To understand the litigation hold notice received from the Department of Education, refer to the document titled "Project: Litigation Hold Notice" (IS3350.U7.TS4.doc) that your instructor has provided for you.

As a reminder, this Litigation Hold preservation obligation supersedes any existing statutory or regulatory document retention period or destructive schedule. The determination of what information may be potentially relevant is based upon content and substance and generally does not depend on the type of medium in which the information exists.

The information requested may exist in various forms, including paper records, hand-written notes, telephone log entries, email, and other electronic communications (including voicemail), word processing documents (including drafts, spreadsheets, databases, and calendars), telephone logs, electronic address books, personal digital assistant (PDA) like Palm Pilots and Blackberries, internet usage files, systems manuals, and network access information in their original format. All Electronically Stored Information (ESI)should be preserved in its originally created, or "native" format, along with related metadata. Relevant backup tapes and all indexes for those tapes should also be preserved. Reasonably accessible information must also be preserved, because such sources will need to be identified under compelling circumstances, and may need to be produced.If you have any doubts as to whether specific information is responsive, err on the side of preserving that information.

Deliverables

After receiving the Litigation Hold Notice, your next task is to do the following:

- Create adocument retention policy for your College that complies with all state and Federal regulations.

- Create a Litigation Hold Notice similar to the one provided to you in the handout titled "Project: Appendix A".

- Create a checklist of procedures that must be followed in order to comply with the Litigation Hold Notice.

- Prepare a summary of all your findings

Reference no: EM13346371

Questions Cloud

A jayantha commenced business on 1 january 2010 with equity : a. jayantha commenced business on 1 january 2010 with equity of 100000. during the year ending 31 december 2010 he paid
Task 1you are part of a global financial services company : task 1you are part of a global financial services company that has offices in london new york tokyo and singapore. its
On a graph this is demonstrated by a series of hills and : on a graph this is demonstrated by a series of hills and valleys corresponding to the expansion and contraction of
Task 11 wal-mart has had various stock splits its stock : task 11. wal-mart has had various stock splits. its stock price is hovering around 50 per share. berkshire hathaway led
The purpose of this project is to provide you with an : the purpose of this project is to provide you with an opportunity to create a document retention policy. you will also
Using an appropriatenbspcnbspsyntax write the code required : using an appropriatenbspcnbspsyntax write the code required to analyse and display the data as per the problem
1what will be the effects of an increase in the money : 1.what will be the effects of an increase in the money supply on the interest rate? what will be the effects of an
1 discuss the different agencies institutes centers and : 1 discuss the different agencies institutes centers and other national bodies that are involved in environmental work
Question the two dof system below has two moving masses m1 : question the two dof system below has two moving masses m1 m2 with an input force of ft applied to m . the

Reviews

Write a Review

Computer Networking Questions & Answers

  Identity intended recipient of data-statistical multiplexor

When data is transmitted using a statistical multiplexor, the individual units of data must have some form of address that tells the receiver the identity of the intended recipient of each piece of data.

  What was the most important aspect of the csiro patent

Investigate the history of the CSIRO Wifi patent which was recently up-held in courts in the United States. This patent covers significant aspects of the OFDM implementation which is used in modern Wifi devices.

  Differentiate data-voice and video signals

Describe the differences between data, voice, and video signals in 200 to 300 words. Write a explanation comparing differences between PBX and VoIP.

  What rfc gives the protocol and specifications a news server

List and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

  What are the characteristics of tcp-ip- http protocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols?

  Presentation to a civic organization on the ''best practices''

presentation to a civic organization on the 'best practices' for home and small business wireless network security. Provide an outline of the contents of that presentation which includes suggestions for best practices for home/SOHO security.

  Explain system enforces both blp and biba properties

Integrity SL = security clearance for level L = integrity clearance for level L SC = security category set for cat. C = integrity category set for cat C. Prove that in this system subject can only read and write at his own level.

  Explain a tcp connection between host a and host b

Is it possible for an application to enjoy reliable data transfer even when the application runs over UDP? If so, please be specific in your answer of how this takes place.

  How is the adoption of an enterprise security framework

1. Identify and discuss at least three major evolutionary steps in digital computing/networking experienced in major organizations. If possible, provide such insight regarding your current or former organization.

  Calculating higher data rate in atm line

Dog can travel to your side, wherever you may be, at 18 km/hour. For what range of distances does dog have a higher data rate than 155 Mbps ATM line?

  Types of cable to make connection

Bank Corp. is planning new network. Engineers in design shop should have connections to accountants and salespeople in front officeWhat types of cable will work to make this connection?

  Compute actual maximum channel capacity

Given narrow (usable) audio bandwidth of telephone transmission facility, a nominal SNR of 56dB (400,000), and a distortion level of <0.2%. Determine actual maximum channel capacity?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd